performance trouble

2012-01-23 Thread David Cure
Hello, I use several kvm box, and no problem at all except for 1 application that have bad response time. The VM runs Windows 2008R2 and the application is an client-server app develop with progress software and talk to an Oracle databasei (on another server) and

[Bug 42635] New: PCIe passthrough broken with AMD iommu after s2disk / resume

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42635 Summary: PCIe passthrough broken with AMD iommu after s2disk / resume Product: Virtualization Version: unspecified Kernel Version: 3.1 Platform: All OS/Version: Linux

[Bug 42636] New: PCI passthrough does not work with AMD iommu for PCI device

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42636 Summary: PCI passthrough does not work with AMD iommu for PCI device Product: Virtualization Version: unspecified Kernel Version: 3.1 Platform: All OS/Version: Linux

Re: performance trouble

2012-01-23 Thread David Cure
Le Mon, Jan 23, 2012 at 09:28:37AM +0100, David Cure ecrivait : I attach the libvirt xml of my vm. I forget to attach ;) David. rds.xml Description: XML document signature.asc Description: Digital signature

[PATCH 0/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Takuya Yoshikawa
The last one is an RFC patch: I think it is better to refactor the rmap things, if needed, before other architectures than x86 starts large pages support. Takuya arch/ia64/kvm/kvm-ia64.c|8 arch/powerpc/kvm/book3s_64_mmu_hv.c |6 +++---

[PATCH 1/4] KVM: MMU: Use gfn_to_rmap() in audit_write_protection()

2012-01-23 Thread Takuya Yoshikawa
We want to eliminate direct access to the rmap array. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp --- arch/x86/kvm/mmu_audit.c |4 +--- 1 files changed, 1 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c index 6eabae3..e62fa4f

[PATCH 2/4] KVM: MMU: Use __gfn_to_rmap() in kvm_handle_hva()

2012-01-23 Thread Takuya Yoshikawa
We can hide the implementation details and treat every level uniformly. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp --- arch/x86/kvm/mmu.c | 12 ++-- 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index

[PATCH 3/4] KVM: Introduce gfn_to_index() which returns the index for a given level

2012-01-23 Thread Takuya Yoshikawa
We can also use this for PT_PAGE_TABLE_LEVEL to treat every level uniformly. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp --- arch/x86/kvm/mmu.c |3 +-- include/linux/kvm_host.h |7 +++ virt/kvm/kvm_main.c |4 +--- 3 files changed, 9 insertions(+), 5

[RFC PATCH 4/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Takuya Yoshikawa
Though we have one rmap array for every level, those for large pages, called rmap_pde, are coupled with write_count information and constitute lpage_info arrays. To hide this implementation details, we are now using __gfn_to_rmap() which includes likely(level == PT_PAGE_TABLE_LEVEL) heuristics;

[Bug 42636] PCI passthrough does not work with AMD iommu for PCI device

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42636 Alex Williamson alex.william...@redhat.com changed: What|Removed |Added CC|

[Bug 42635] PCIe passthrough broken with AMD iommu after s2disk / resume

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42635 Alex Williamson alex.william...@redhat.com changed: What|Removed |Added CC|

[PATCH kvm-unit-tests 0/4] VM86 testcase and run_tests.sh

2012-01-23 Thread Kevin Wolf
This adds a test case for taskswitches into/out of VM86. This test case currently fails on KVM, it passes with TCG. I'll send out KVM fixes together with this series. I also included a small shell script that just runs tests and prints a PASS/FAIL message for each. I've been using this script

[PATCH kvm-unit-tests 1/4] Add run_tests.sh

2012-01-23 Thread Kevin Wolf
This adds a convenient way to run all tests without having to set up Autotest. Signed-off-by: Kevin Wolf kw...@redhat.com --- run_tests.sh | 107 ++ 1 files changed, 107 insertions(+), 0 deletions(-) create mode 100755 run_tests.sh diff

[PATCH kvm-unit-tests 2/4] Add taskswitch testcases to unittest.cfg

2012-01-23 Thread Kevin Wolf
Signed-off-by: Kevin Wolf kw...@redhat.com --- x86/unittests.cfg | 12 1 files changed, 12 insertions(+), 0 deletions(-) diff --git a/x86/unittests.cfg b/x86/unittests.cfg index 065020a..dac7d44 100644 --- a/x86/unittests.cfg +++ b/x86/unittests.cfg @@ -64,6 +64,18 @@ file =

[PATCH kvm-unit-tests 3/4] Fix i386 build

2012-01-23 Thread Kevin Wolf
Commit 1d946e07 removed idt, but left a reference to idt in i386-only code. Signed-off-by: Kevin Wolf kw...@redhat.com --- lib/x86/desc.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/lib/x86/desc.c b/lib/x86/desc.c index c268955..770c250 100644 --- a/lib/x86/desc.c

[PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Kevin Wolf
This adds a test case that jumps into VM86 by iret-ing to a TSS and back to Protected Mode using a task gate in the IDT. Signed-off-by: Kevin Wolf kw...@redhat.com --- config-i386.mak |3 +- lib/x86/desc.c| 37 +- lib/x86/desc.h| 36

[PATCH 1/3] KVM: x86 emulator: Fix task switch privilege checks

2012-01-23 Thread Kevin Wolf
Currently, all task switches check privileges against the DPL of the TSS. This is only correct for jmp/call to a TSS. If a task gate is used, the DPL of this take gate is used for the check instead. Exceptions, external interrupts and iret shouldn't perform any check. This patch fixes the problem

[PATCH 2/3] KVM: x86 emulator: VM86 segments must have DPL 3

2012-01-23 Thread Kevin Wolf
Setting the segment DPL to 0 for at least the VM86 code segment makes the VM entry fail on VMX. Signed-off-by: Kevin Wolf kw...@redhat.com --- arch/x86/kvm/emulate.c |2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index

[PATCH 3/3] KVM: x86 emulator: Allow PM/VM86 switch during task switch

2012-01-23 Thread Kevin Wolf
Task switches can switch between Protected Mode and VM86. The current mode must be updated during the task switch emulation so that the new segment selectors are interpreted correctly and privilege checks succeed. Signed-off-by: Kevin Wolf kw...@redhat.com --- arch/x86/include/asm/kvm_emulate.h

Re: [PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Gleb Natapov
On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote: This adds a test case that jumps into VM86 by iret-ing to a TSS and back to Protected Mode using a task gate in the IDT. Can you add the test case to taskswitch2.c? Signed-off-by: Kevin Wolf kw...@redhat.com --- config-i386.mak

Continuous reboots on qemu-kvm master

2012-01-23 Thread erik . rull
Hi all, I get continuous reboots on my guest system, including these dmesg entries: [ 31.770538] device tap0 entered promiscuous mode [ 31.770554] br0: port 2(tap0) entering learning state [ 39.259921] kvm: 1517: cpu0 unhandled wrmsr: 0x0 data 400080532d74 [ 39.259936] kvm: 1517:

Re: [PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Kevin Wolf
Am 23.01.2012 17:10, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote: This adds a test case that jumps into VM86 by iret-ing to a TSS and back to Protected Mode using a task gate in the IDT. Can you add the test case to taskswitch2.c? That's actually what I

[Bug 42635] PCIe passthrough broken with AMD iommu after s2disk / resume

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42635 --- Comment #2 from Klaus Mueller kmuel...@justmail.de 2012-01-23 16:18:33 --- The device never works in the guest after s2disk/resume cycle of the host. But it always works if it's used by the host itself - even after a s2disk/resume cycle.

Re: [PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Gleb Natapov
On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote: Am 23.01.2012 17:10, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote: This adds a test case that jumps into VM86 by iret-ing to a TSS and back to Protected Mode using a task gate in the IDT. Can

[Bug 42636] PCI passthrough does not work with AMD iommu for PCI device

2012-01-23 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=42636 --- Comment #2 from Klaus Mueller kmuel...@justmail.de 2012-01-23 16:26:49 --- Well, I did exactly what you proposed, but I got the same error again, as I tried to apply both devices. That's the relevant part of the xml file: hostdev

Re: [PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Kevin Wolf
Am 23.01.2012 17:22, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote: Am 23.01.2012 17:10, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote: This adds a test case that jumps into VM86 by iret-ing to a TSS and back to Protected

Re: [PATCH kvm-unit-tests 4/4] x86/taskswitch_vm86: Task switches into/out of VM86

2012-01-23 Thread Gleb Natapov
On Mon, Jan 23, 2012 at 05:32:59PM +0100, Kevin Wolf wrote: Am 23.01.2012 17:22, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:20:22PM +0100, Kevin Wolf wrote: Am 23.01.2012 17:10, schrieb Gleb Natapov: On Mon, Jan 23, 2012 at 05:07:13PM +0100, Kevin Wolf wrote: This adds a test case

[PATCH v2 0/5] VFIO core framework

2012-01-23 Thread Alex Williamson
This series includes the core framework for the VFIO driver. VFIO is a userspace driver interface meant to replace both the KVM device assignment code as well as interfaces like UIO. Please see patch 1/5 for a complete description of VFIO, what it can do, and how it's designed. This series can

[PATCH v2 1/5] vfio: Introduce documentation for VFIO driver

2012-01-23 Thread Alex Williamson
Including rationale for design, example usage and API description. Signed-off-by: Alex Williamson alex.william...@redhat.com --- Documentation/vfio.txt | 359 1 files changed, 359 insertions(+), 0 deletions(-) create mode 100644

[PATCH v2 2/5] vfio: VFIO core header

2012-01-23 Thread Alex Williamson
This defines both the user and bus driver APIs. Signed-off-by: Alex Williamson alex.william...@redhat.com --- Documentation/ioctl/ioctl-number.txt |1 include/linux/vfio.h | 395 ++ 2 files changed, 396 insertions(+), 0 deletions(-) create

[PATCH v2 3/5] vfio: VFIO core group interface

2012-01-23 Thread Alex Williamson
This provides the base group management with conduits to the IOMMU driver and VFIO bus drivers. Signed-off-by: Alex Williamson alex.william...@redhat.com --- drivers/vfio/vfio_main.c| 1248 +++ drivers/vfio/vfio_private.h | 36 + 2 files changed,

[PATCH v2 4/5] vfio: VFIO core IOMMU mapping support

2012-01-23 Thread Alex Williamson
Backing for operations on the IOMMU object, including DMA mapping and unmapping. Signed-off-by: Alex Williamson alex.william...@redhat.com --- drivers/vfio/vfio_iommu.c | 611 + 1 files changed, 611 insertions(+), 0 deletions(-) create mode 100644

[PATCH v2 5/5] vfio: VFIO core Kconfig and Makefile

2012-01-23 Thread Alex Williamson
Enable the base code. Signed-off-by: Alex Williamson alex.william...@redhat.com --- MAINTAINERS |8 drivers/Kconfig |2 ++ drivers/Makefile |1 + drivers/vfio/Kconfig |8 drivers/vfio/Makefile |3 +++ 5 files changed, 22 insertions(+),

KVM call agenda for Tuesday 24

2012-01-23 Thread Markus Armbruster
Please send in any agenda items you are interested in covering. Cheers, Markus -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [Qemu-devel] [PATCH 00/20] [PULL] qemu-kvm.git uq/master queue

2012-01-23 Thread Anthony Liguori
On 01/20/2012 11:26 AM, Marcelo Tosatti wrote: The following changes since commit 8c4ec5c0269bda18bb777a64b2008088d1c632dc: pxa2xx_keypad: fix unbalanced parenthesis. (2012-01-17 02:14:42 +0100) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git

Re: [PATCH] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-01-23 Thread Marcelo Tosatti
On Thu, Jan 19, 2012 at 10:22:41PM -0500, Christoffer Dall wrote: The kvm_vcpu_kick function performs roughly the same funcitonality on most all architectures, so we shouldn't have separate copies. PowerPC keeps a pointer to interchanging waitqueues on the vcpu_arch structure and to

Re: [PATCH 0/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Marcelo Tosatti
On Mon, Jan 23, 2012 at 07:42:04PM +0900, Takuya Yoshikawa wrote: The last one is an RFC patch: I think it is better to refactor the rmap things, if needed, before other architectures than x86 starts large pages support. Takuya Looks good to me. -- To unsubscribe from this list:

Re: Continuous reboots on qemu-kvm master

2012-01-23 Thread Marcelo Tosatti
On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote: Hi all, I get continuous reboots on my guest system, including these dmesg entries: [ 31.770538] device tap0 entered promiscuous mode [ 31.770554] br0: port 2(tap0) entering learning state [ 39.259921] kvm:

Re: Continuous reboots on qemu-kvm master

2012-01-23 Thread Erik Rull
Marcelo Tosatti wrote: On Mon, Jan 23, 2012 at 05:12:07PM +0100, erik.r...@rdsoftware.de wrote: Hi all, I get continuous reboots on my guest system, including these dmesg entries: [ 31.770538] device tap0 entered promiscuous mode [ 31.770554] br0: port 2(tap0) entering learning state [

[PATCH] qemu-kvm: Resolve unneeded diffs to upstream in pc-bios

2012-01-23 Thread Jan Kiszka
None of those files have any meaning for today's qemu-kvm. Signed-off-by: Jan Kiszka jan.kis...@siemens.com --- Note that I removed the binary patch to delete pc-bios/openbios-sparc. It seemms to have caused troubles getting this on the list. pc-bios/bios-vista.diff | 17 -

[no subject]

2012-01-23 Thread Sergei Trofimovich
subscribe kvm -- To unsubscribe from this list: send the line unsubscribe kvm in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH v2] qemu-kvm: Remove icache flush from cpu_physical_memory_rw

2012-01-23 Thread Scott Wood
On 01/19/2012 12:04 PM, Jan Kiszka wrote: On 2012-01-19 18:54, Marcelo Tosatti wrote: On Thu, Jan 19, 2012 at 01:39:24PM +0100, Jan Kiszka wrote: This is at best a PPC topi but according to [1] even there unneeded. In any case, remove this diff to upstream, it should be handled there if

Videos for kvm forum 2010

2012-01-23 Thread Nick H
Hello All, Non-development question, apologies if I am posting to the wrong list, but I cannot seem to find linux kvm forum 2010 videos at the following link: http://www.linux-kvm.org/page/KVM_Forum_2010 Is there some place else where they might be present ? Nick -- To unsubscribe from this

[no subject]

2012-01-23 Thread Gabe Black
Hi, I think I've tracked down the bug that causes KVM_GET_SUPPORTED_CPUID failed: Argument list too long errors when using the kvm tool. Basically, this (possibly squished) code seems to be to blame: case 0xd: { int i; entry-flags |= KVM_CPUID_FLAG_SIGNIFCANT_INDEX; for (i = 1; *nent maxnent i

Fix for bug that causes KVM_GET_SUPPORTED_CPUID failed errors.

2012-01-23 Thread Gabe Black
Sorry, forgot to add a subject. Gabe On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black gabebl...@google.com wrote: Hi, I think I've tracked down the bug that causes KVM_GET_SUPPORTED_CPUID failed: Argument list too long errors when using the kvm tool. Basically, this (possibly squished) code seems

Re: Fix for bug that causes KVM_GET_SUPPORTED_CPUID failed errors.

2012-01-23 Thread Sasha Levin
The GET_SUPPORTED_CPUID bug has been fixed and shouldn't be happening from v3.2 onwards. Do you still see the issue in older versions? On Mon, 2012-01-23 at 21:20 -0800, Gabe Black wrote: Sorry, forgot to add a subject. Gabe On Mon, Jan 23, 2012 at 9:18 PM, Gabe Black gabebl...@google.com

[PATCH 0/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Takuya Yoshikawa
The last one is an RFC patch: I think it is better to refactor the rmap things, if needed, before other architectures than x86 starts large pages support. Takuya arch/ia64/kvm/kvm-ia64.c|8 arch/powerpc/kvm/book3s_64_mmu_hv.c |6 +++---

[PATCH 1/4] KVM: MMU: Use gfn_to_rmap() in audit_write_protection()

2012-01-23 Thread Takuya Yoshikawa
We want to eliminate direct access to the rmap array. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp --- arch/x86/kvm/mmu_audit.c |4 +--- 1 files changed, 1 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c index 6eabae3..e62fa4f

[PATCH 2/4] KVM: MMU: Use __gfn_to_rmap() in kvm_handle_hva()

2012-01-23 Thread Takuya Yoshikawa
We can hide the implementation details and treat every level uniformly. Signed-off-by: Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp --- arch/x86/kvm/mmu.c | 12 ++-- 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c index

[RFC PATCH 4/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Takuya Yoshikawa
Though we have one rmap array for every level, those for large pages, called rmap_pde, are coupled with write_count information and constitute lpage_info arrays. To hide this implementation details, we are now using __gfn_to_rmap() which includes likely(level == PT_PAGE_TABLE_LEVEL) heuristics;

Re: [PATCH] KVM: Factor out kvm_vcpu_kick to arch-generic code

2012-01-23 Thread Marcelo Tosatti
On Thu, Jan 19, 2012 at 10:22:41PM -0500, Christoffer Dall wrote: The kvm_vcpu_kick function performs roughly the same funcitonality on most all architectures, so we shouldn't have separate copies. PowerPC keeps a pointer to interchanging waitqueues on the vcpu_arch structure and to

Re: [PATCH 0/4] KVM: Decouple rmap_pde from lpage_info write_count

2012-01-23 Thread Marcelo Tosatti
On Mon, Jan 23, 2012 at 07:42:04PM +0900, Takuya Yoshikawa wrote: The last one is an RFC patch: I think it is better to refactor the rmap things, if needed, before other architectures than x86 starts large pages support. Takuya Looks good to me. -- To unsubscribe from this list: